狂乱 发表于 2025-3-25 06:23:13

A Task-Based Privacy Model,This Chapter presents the concept of a formal security model that enforces basic legal privacy requirements, such as .. Besides, the model is based on the integrity concepts of well-formed transactions and separation of duty. The formal mathematical model is presented in Appendix A.

割让 发表于 2025-3-25 11:21:24

Concluding Remarks,On the way to the Global Information Society privacy is increasingly at risk and cannot be effectively protected solely by privacy legislation. Thus, in addition to privacy protection by data protection legislation, privacy should also be technically enforced and should be a design criterion for information and communication systems.

正常 发表于 2025-3-25 11:48:12

Appendix A: Formal Mathematical Privacy Model,In this Appendix, the formal mathematical privacy model is presented. A definition of a privacy-oriented system will be given, which is partly analogous to the defintion of a secure system given in . It will be formally proven that the system defined by the formal privacy model is privacy-oriented.

哥哥喷涌而出 发表于 2025-3-25 16:11:31

Simone Fischer-HübnerIncludes supplementary material:

Enthralling 发表于 2025-3-25 22:21:21

http://reply.papertrans.cn/47/4605/460492/460492_25.png

carotenoids 发表于 2025-3-26 00:18:28

0302-9743 ce with the Generalized Framework for Access Control (GFAC)..This book will appeal equally to R&D professionals and practitioners active in IT security and privacy, advanced students, and IT managers.978-3-540-42142-9978-3-540-45150-1Series ISSN 0302-9743 Series E-ISSN 1611-3349

PHONE 发表于 2025-3-26 05:43:42

http://reply.papertrans.cn/47/4605/460492/460492_27.png

Fibrin 发表于 2025-3-26 11:38:32

http://reply.papertrans.cn/47/4605/460492/460492_28.png

缓和 发表于 2025-3-26 16:39:11

brication processes may alter the characteristics of TMMs, causing unmatched properties with biological tissues. Therefore, systematic processes are needed for efficient phantom development. Seven stages in systematic processes have been proposed in this two chapters to guide researchers in generati

maudtin 发表于 2025-3-26 16:48:06

http://reply.papertrans.cn/47/4605/460492/460492_30.png
页: 1 2 [3] 4 5
查看完整版本: Titlebook: IT-Security and Privacy; Design and Use of Pr Simone Fischer-Hübner Book 2001 Springer-Verlag Berlin Heidelberg 2001 IT security.Informatio